rsa solutions empower mol to build a proactive

CUSTOMER Q&A
RSA SOLUTIONS EMPOWER MOL TO BUILD
A PROACTIVE, ADAPTIVE SECURITY MODEL
THAT ADDS BUSINESS VALUE
AT-A-GLANCE
Challenges
Results
–– MOL
DZ Bank
Group
is responsible
previously took
for providing
a reactiveproducts
approach
and
to services
its
security
and its banks
strategy
lacked
cohesion
andGermany.
focus.
for cooperative
and
customers
across
––––It
Security
wantedwas
to develop
not centrally
its technology
organized,tocreating
combat siloes
currentand
and
future
threats while managing incidents efficiently and
inconsistencies.
––proactively.
It needed to provide a unified view of all security-related
work for management and compliance.
®
–– W
With
ith RSA NetWitness
Archer, DZ Bank
Logs
reduced
and Packets
the time
andtoRSA
create
Archer,
a
MOL
Group
identified
suspicious
activity
andtoreacted
business
continuity
plan
from three
months
a few to
threats
preventatitve
measures.
minutes,with
as well
as being able
to designate time-critical
processes
withwas
justable
a few
–– The
company
toclicks.
identify threats easily and bring
data
to top executives
propose
–– quantative
Response to
unforeseen
issues isto
now
much faster, with
improvements.
risks around a recent water supply failure in its main
building mitigated in a matter of minutes.
“The measure of a relationship is not about how good you are when everything’s great; it’s about
how you turn around when things go wrong. Every single time I have a conversation with RSA
about what needs to change it’s picked up, taken on board, and it’s recycled back out.”
JASON HAWARD-GRAU, GROUP CHIEF INFORMATION SECURITY OFFICER, MOL GROUP
As a Fortune 500 company operating in
Why is security important to you?
approximately 26 markets, MOL Group is
Jason Howard-Grau, Group Chief Information
Security Officer: Information security is being
brought into everyday business discussions,
from everything from deploying a bond into
the marketplace, through to the due diligence
that we now do on the acquisitions, so it’s
fundamentally become ever more important.
one of the world’s largest oil and gas
companies. It operates in about 40
countries with a work force of 27,000
people, four refineries, two petrochemical
plants, and over 2,000 service stations in
central and South-Eastern Europe.
How are you organized to meet your
security goals?
Howard-Grau: We are separated into the core
functions of risk and compliance; architecture;
design and insurance, and cyber defence
capabilities. Then program management and
governance underpin all of those areas.
However, our Information Security department
actually sits outside of the IT department. We
chose to do this because we wanted the
indepdence to work efficiently in partnership
with IT, without being tied to that
department’s operational goals.
What drove your decision to implement
RSA solutions?
Tamás Kapócs, Head of Security and
Architecture Design and Assurance: Before
using RSA solutions, we only had basic
analysis capabilities in the organization and we
obviously wanted to develop this to face
today’s challenges. We needed to think about
incident management as well.
Howard-Grau: The organization was focused
very much on the reactive end of the spectrum,
so the focus was on understanding what might
have happened, rather than looking at it from a
proactive threat detection perspective. Across
our organizations what we were really looking
at was a set of disjointed technologies that
lacked cohesion and strategy, and lacked
focus.
Why did you choose RSA NetWitness Logs
and Packets and RSA Archer?
Howard-Grau: We were backward-looking as an
organization. The horse was out of the stable
and some were even in the next field, and we
hadn’t even noticed that the gate was open. By
deploying the RSA suite we wanted to give
ourselves the chance to actually aggregate
information in the right places and drive it
towards insight.
Kapócs: We deployed RSA NetWitness Logs and
Packets back last year in 2015 and currently we
are in the process of setting up our Archer
framework and infrastructure and on top of it
we are deploying security operations suite and
vulnerability and risk management.
With RSA Archer we are looking to have a base
platform for all the security orchestration,
needs and processes that we have. This will be
the core platform which can collect and analyze
all the information we need.
Can you share an example of how you’re
using the tool?
Howard-Grau: We switched on NetWitness Logs
and Packets and a lot of things suddenly
started lighting up, just like a Christmas tree.
For example, we were being hit by a large
number of phishing emails, and as soon as we
switched on NetWitness Logs and Packets we
started to detect them. The cyber defence
organization identified that this was a
particular targeted type of campaign, and we
moved very quickly to identify the known bad
IP list and make sure that the outbound
firewalls were blocking those. By having the
actual facts in our hands I can sit down with the
CIO and say, “We have some serious issues
with our ability to update our known bad IP
lists, to update and manage our firewalls
effectively.”
What are the benefits of selecting RSA
solutions?
Kapócs: Seeing more and being able to dig into
the details is helping us to really find the root
cause of certain problems, and avoid missing
key events that are going on in our enterprise
networks and systems. We can continuously
report, measure and analyze how many
vulnerable hosts we have, how long those
vulnerabilities have been out there and how
quickly we can eliminate certain vulnerabilities.
This is key for the business to understand so
we can focus our resources on to those areas
where there is the highest need.
What is the benefit to you of working with
RSA?
Howard-Grau: The measure of a relationship is
not about how good you are when everything’s
great; it’s about how you turn around when
things go wrong. Every single time I have a
conversation with RSA about what needs to
change it’s picked up, taken on board, and it’s
recycled back out. For me RSA is all about
partnership.
What business value were you able to
generate?
What best practices can you share with
others?
Howard-Grau: Business value for us is more
about risk aversion. The business wants to
know they’re protected but the price of that
protection is hard to quantify. Most
organizations recognize that information
security is seen very much as the umbrella for a
rainy day. It’s not a great position to be in, but
it’s the reality in which we’re currently
operating in, and we’re gradually changing that.
However, I would say right now the value is in
driving insight. It’s about the moments when
we can say, “Ah that’s different. Didn’t see that
before. What do you think that is? Why is that
happening?” These are all the questions that
my team are starting to ask, and the value in
that is massive.
Kapócs: Looking into the enterprise security
architecture was key, as was building it up in a
way that is easy to understand for our top
management. We can now articulate the value
of it and also the risks that we can mitigate or
address with all these solutions. At the same
time it was crucial for us to make sure that we
have the right connection points to the key
business processes. Our team is engaged all
the time to check any information security
capability or just to make sure that the right
controls are there from design.
One breach that we can detect and prevent, or
respond and contain is worth a significant
amount of value to our business. Our refineries
are extremely expensive; we have a huge
investment over a long period of time across
multiple geographies and some of the most
challenging parts of the world. Practically
speaking it’s really simple: if we detect it,
prevent it, that’s value.
How do your security insights inform
conversations with the business?
Howard-Grau: By having the actual facts in our
hands I can sit down with the CIO and say, “We
have some serious issues with our ability to
update our known bad IP lists, or to update and
manage our firewalls effectively.” It’s not a
panacea, we didn’t get there completely
overnight, and we’re not there yet, but at least
by having both the information in my hand and
the insight I can draw from it, I can have those
really powerful business conversations. They’re
not based on what I think or what I believe, but
based on what I know, and those facts are very
difficult to dispute.
What’s the next step in your security
journey?
Kapócs: The next step in our journey is to look
at standardization within information security.
We’d like to implement a common set of key
information security capabilities, solutions and
technologies in our business and this will help
us drive our strategy and enterprise
architecture going forward.
Howard-Grau: We’ve established a role
structure that actually helps people from the
beginning as they come into the organization
understand where they want to get to, then our
job is to make sure that we facilitate their
growth in the right way. At the same time, we
need to ensure that we have the right training
budget in place. We recognize that the world
we’re operating in is adapting every three to six
months. New technologies come on the market,
new threats hit us, and the way that we did
something three months ago will not be the
way that we need to do it in six months’ time.
Being adaptive to those changes means that I
need to make sure my workforce is also
adaptive.
CONTACT US
To learn more about how RSA
products, services, and solutions help
solve your business and IT challenges
contact your local representative or
authorized reseller – or visit us at
www.rsa.com
©2016 EMC Corporation. All rights reserved. EMC, RSA, the RSA logo, RSA NetWitness Logs and Packets and
RSA Archer are the property of EMC Corporation in the United States and/or other countries. All other
trademarks referenced are the property of their respective owners. MOL Group
www.rsa.com